Strengthening Public Key Authentication Against Key Theft (Short Paper)

نویسندگان

  • Martin Kleppmann
  • Conrad Irwin
چکیده

Authentication protocols based on an asymmetric keypair provide strong authentication as long as the private key remains secret, but may fail catastrophically if the private key is lost or stolen. Even when encrypted with a password, stolen key material is susceptible to offline brute-force attacks. In this paper we demonstrate a method for rate-limiting password guesses on stolen key material, without requiring special hardware or changes to servers. By slowing down offline attacks and enabling easy key revocation our algorithm reduces the risk of key compromise, even if a low-entropy password is used.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhanced Risk Management of Hardware Authentication Tokens

With concerns growing about the future security of RSA, D&H and ECDSA public key algorithms, it is argued that collision-resistant hash functions and stream ciphers with complex irregular structures that accept double key lengths are secure against quantum based computing attacks [1]. As a multi-function cipher that includes collision-resistant hash functionality, VEST can be deployed with less...

متن کامل

One-Time Password Authentication Scheme to Solve Stolen Verifier Problem

Secure authentication schemes between an authentication server and users are required to avoid many risks on the Internet. There are three authentication schemes: static password authentications like Basic and Digest Access Authentication[1], public-key certificate schemes, and one-time password schemes. In spite of using SSL/TLS, the static password authentications are known as being insecure ...

متن کامل

Immunizing Public Key Cryptosystems against Chosen Ciphertext Attacks 1

This paper presents three methods for strengthening public key cryptosys-tems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any ciphertexts, except for the exact object cipher-text to be cryptanalyzed. The rst strengthening method is based on the use of one-way h...

متن کامل

Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks

This paper presents three methods for strengthening public key cryptosys tems in such a way that they become secure against adaptively chosen ciphertext attacks In an adaptively chosen ciphertext attack an attacker can query the deciphering algorithm with any ciphertexts except for the exact object cipher text to be cryptanalyzed The rst strengthening method is based on the use of one way hash ...

متن کامل

Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks (Extended Abstract)

This paper presents three methods for strengthening public key cryptosystems in such a way that they become secure against adaptively chosen ciphertext attacks. In an adaptively chosen ciphertext attack, an attacker can query the deciphering algorithm with any cipher-texts, except for the exact object ciphertext to be cryptanalyzed. The rst strengthening method is based on the use of one-way ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015